Results 11 to 20 of about 5,960 (196)

DICED (Database of Identified Cleavage Sites Endemic to Diseases States): A Searchable Web Interface for Terminomics/Degradomics. [PDF]

open access: yesProteomics
ABSTRACT Proteolysis is an irreversible posttranslational modification with immense biological impact. Owing to its high disease significance, there is growing interest in investigating proteolysis on the proteome scale, termed degradomics. We developed ‘Database of Identified Cleavage sites Endemic to Disease states’ (DICED; https://diced.lerner.ccf ...
Joshi J   +5 more
europepmc   +2 more sources

Enhancing Security of Web-Based IoT Services via XSS Vulnerability Detection [PDF]

open access: yesSensors, 2023
The Internet of Things (IoT) technology is experiencing significant growth and integration into various aspects of daily life. With the rising number of connected devices, diverse security challenges are emerging as substantial threats to IoT. Cross-Site
Jemin Kim, Joonseok Park
doaj   +2 more sources

Cross-site scripting attack detection based on a modified convolution neural network [PDF]

open access: yesFrontiers in Computational Neuroscience, 2022
Cross-site scripting (XSS) attacks are currently one of the most threatening network attack methods. Effectively detecting and intercepting XSS attacks is an important research topic in the network security field. This manuscript proposes a convolutional
Huyong Yan   +16 more
doaj   +2 more sources

Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications [PDF]

open access: yesSensors, 2023
The web application market has shown rapid growth in recent years. The expansion of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) has created new web-based communication and sensing frameworks. Current security research utilizes source
Ankur Chowdhary   +2 more
doaj   +2 more sources

Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review [PDF]

open access: yesSensors, 2022
Cross channel scripting (XCS) is a common web application vulnerability, which is a variant of a cross-site scripting (XSS) attack. An XCS attack vector can be injected through network protocol and smart devices that have web interfaces such as routers ...
Indushree M   +4 more
doaj   +2 more sources

Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks [PDF]

open access: yesSensors, 2023
New techniques and tactics are being used to gain unauthorized access to the web that harm, steal, and destroy information. Protecting the system from many threats such as DDoS, SQL injection, cross-site scripting, etc., is always a challenging issue ...
Babu R. Dawadi   +2 more
doaj   +2 more sources

Securing web applications against XSS and SQLi attacks using a novel deep learning approach [PDF]

open access: yesScientific Reports
Modern web application development involves handling enormous amounts of sensitive and consequential data. Security is, therefore, a crucial component of developing web applications. A web application's security is concerned with safeguarding the data it
Jaydeep R. Tadhani   +4 more
doaj   +2 more sources

Rule-defect oriented browser XSS filter test method

open access: yes网络与信息安全学报, 2018
In order to alleviate XSS (cross-site scripting) attacks,modern browsers use XSS filters for defense.It is difficult to effectively test and evaluate the security of browser XSS filters.The rule-defect is the defect and security problem in the ...
Zhijie GUI, Hui SHU
doaj   +3 more sources

Analisis Kerentanan XSS dan Rate Limiting Pada Website SMAN 8 Denpasar Menggunakan Framework OWASP ZAP

open access: yesJurnal informatika UPGRIS, 2022
Pada era digital sekarang hampir semua orang mengakses internet, Website merupakan salah satu situs yang ada di internet yang dapat menyimpan dan menyebarkan segala informasi.
Gede Angga Septiawan   +3 more
doaj   +1 more source

Models and scenarios of implementation of threats for internet resources

open access: yesРоссийский технологический журнал, 2020
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection.
S. A. Lesko
doaj   +1 more source

Home - About - Disclaimer - Privacy